期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A strong tracking nonlinear robust filter for eye tracking 被引量:9
1
作者 Zutao ZHANG Jiashu ZHANG 《控制理论与应用(英文版)》 EI 2010年第4期503-508,共6页
Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction.However,due to the high nonlinearity of eye motion,how to ensure the robustness of external interfe... Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction.However,due to the high nonlinearity of eye motion,how to ensure the robustness of external interference and accuracy of eye tracking pose the primary obstacle to the integration of eye movements into today's interfaces.In this paper,we present a strong tracking unscented Kalman filter (ST-UKF) algorithm,aiming to overcome the difficulty in nonlinear eye tracking.In the proposed ST-UKF,the Suboptimal fading factor of strong tracking filtering is introduced to improve robustness and accuracy of eye tracking.Compared with the related Kalman filter for eye tracking,the proposed ST-UKF has potential advantages in robustness and tracking accuracy.The last experimental results show the validity of our method for eye tracking under realistic conditions. 展开更多
关键词 Eye tracking Strong tracking unscented Kalman filter (ST-UKF) Unscented Kalman filter (UKF) Strong tracking filtering (STF)
下载PDF
Remote Three-Factor Authentication Protocol with Strong Robustness for Multi-Server Environment 被引量:1
2
作者 Min Zhang Jiashu Zhang Wenrong Tan 《China Communications》 SCIE CSCD 2017年第6期126-136,共11页
If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and pa... If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and passwords for different servers.To solve these problems,a lot of authentication schemes for multi-server environment have been proposed.Recently,Odelu and Das et al.proposed a secure multi-server authentication protocol based on smart card,biometric and elliptic curve cryptography(ECC) .We firstly analyze Odelu et al.'s scheme and find some flaws as follows:1) the scheme may suffer Denial of Service(Dos) attack and insider attack;2) The scheme doesn't have strong robustness because improper work of the register center(RC) may lead to the collapse of the whole system;3) There are some design flaws in this scheme.For example,the user cannot choose his/her identity randomly and the register center needs to maintain a data table.In order to solve these problems,this paper proposes a new secure three-factor authentication protocol for multi-server environment based on Chebyshev chaotic map and secure sketch algorithm.To verify the security of the proposed scheme,we simulate our scheme using BAN logic and Pro Verif tool.Through a thorough analysis,we can see that the proposed schemenot only has stronger security but also has less computation cost than Odelu et al.'s protocol. 展开更多
关键词 多服务器 认证协议 环境认证 鲁棒性 椭圆曲线密码体制 CHEBYSHEV 远程 协议安全
下载PDF
New Iris Localization Method Based on Chaos Genetic Algorithm
3
作者 贾东立 Muhammad Khurram Khan 张家树 《Journal of Southwest Jiaotong University(English Edition)》 2005年第1期35-38,共4页
This paper present a new method based on Chaos Genetic Algorithm (CGA) to localize the human iris in a given image. First, the iris image is preprocessed to estimate the range of the iris localization, and then CGA is... This paper present a new method based on Chaos Genetic Algorithm (CGA) to localize the human iris in a given image. First, the iris image is preprocessed to estimate the range of the iris localization, and then CGA is used to extract the boundary of the ~iris . Simulation results show that the proposed algorithms is efficient and robust, and can achieve sub pixel precision. Because Genetic Algorithms (GAs) can search in a large space, the algorithm does not need accurate estimation of iris center for subsequent localization, and hence can lower the requirement for original iris image processing. On this point, the present localization algirithm is superior to Daugman's algorithm. 展开更多
关键词 Chaos genetic algorithm Iris localization Geometric primitive extraction
下载PDF
A digital authentication watermarking scheme for JPEG images with superior localization and security 被引量:2
4
作者 YU Miao HE HongJie ZHANG JiaShu 《Science in China(Series F)》 2007年第3期491-509,共19页
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conduc... The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously. 展开更多
关键词 fragile watermarking JPEG compression localization accuracy collage attack
原文传递
A novel strong tracking finite-difference extended Kalman filter for nonlinear eye tracking 被引量:11
5
作者 ZHANG ZuTao ZHANG JiaShu 《Science in China(Series F)》 2009年第4期688-694,共7页
Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction. However, due to the high nonlinearity of eye motion, how to ensure the robust- ness of external in... Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction. However, due to the high nonlinearity of eye motion, how to ensure the robust- ness of external interference and accuracy of eye tracking poses the primary obstacle to the integration of eye movements into today's interfaces. In this paper, we present a strong tracking finite-difference extended Kalman filter algorithm, aiming to overcome the difficulty in modeling nonlinear eye tracking. In filtering calculation, strong tracking factor is introduced to modify a priori covariance matrix and improve the accuracy of the filter. The filter uses finite-difference method to calculate partial derivatives of nonlinear functions for eye tracking. The latest experimental results show the validity of our method for eye tracking under realistic conditions. 展开更多
关键词 strong tracking finite-difference extended Kalman filter (STFDEKF) eye tracking extended Kalman filter (EKF) suboptimal fadingfactor
原文传递
A self-recovery fragile watermarking scheme for image authentication with superior localization 被引量:7
6
作者 HE HongJie ZHANG JiaShu CHEN Fan 《Science in China(Series F)》 2008年第10期1487-1507,共21页
To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking sche... To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking scheme with superior localization, and further discusses the probability of false rejection (PFR) and the probability of false acceptance (PFA) of the proposed scheme. Moreover, four measurements are defined to evaluate the quality of a recovered image. In the proposed algorithm, the original image is divided into 2×2 blocks to improve localization precision and decrease PFR under occurrence of random tampering. The PFR under occurrence of region tampering can be effectively decreased by randomly embedding the watermark of each block in conjunction with a novel method of tamper detection. Compared with the current self-recovery fragile watermarking algorithms, the proposed scheme not only resolves the tamper detection problem of self-embedding watermarking, but also improves the robustness against the random tampering of self-embedding watermarking. In addition, the subjective measurements are provided to evaluate the performance of the self-recovery watermarking schemes for image authentication. 展开更多
关键词 digital watermarking tamper recovery probability of false rejection probability of false acceptance
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部